Integrating L2TP Remote Access VPNs with MPLS VPNs

Review Questions


What are the two modes of operation for L2TP remote access VPNs?


What are some of the main advantages and disadvantages of L2TP VPNs?


How can security be configured for voluntary tunnel mode L2TP remote access VPNs?


What is the purpose of the accept-dialin command?


What is split tunneling, and why is it a potential security risk?


IPsec can be used to secure L2TP tunnels, and digital certificates can be used to authenticate IPsec peers. On the VPN 3000 concentrator, what are the two basic methods of enrolling and obtaining digital certificates from a CA?


When deploying Cisco IOS L2TP client-initiated tunneling (voluntary tunnel mode), what is the main advantage of L2TPv3 over L2TPv2?


How can you debug IKE negotiation packet by packet on a Windows 2000/XP client (examining packet detail)?


In compulsory tunnel mode, how is PPP authentication typically performed on the LAC?


What are the two methods of configuring tunnel definitions on a RADIUS server?

Designing and Deploying IPsec Remote Access and Teleworker VPNs

Part I: Understanding VPN Technology

What Is a Virtual Private Network?

Part II: Site-to-Site VPNs

Designing and Deploying L2TPv3-Based Layer 2 VPNs

Designing and Implementing AToM-Based Layer 2 VPNs

Designing MPLS Layer 3 Site-to-Site VPNs

Advanced MPLS Layer 3 VPN Deployment Considerations

Deploying Site-to-Site IPsec VPNs

Scaling and Optimizing IPsec VPNs

Part III: Remote Access VPNs

Designing and Implementing L2TPv2 and L2TPv3 Remote Access VPNs

Designing and Deploying IPsec Remote Access and Teleworker VPNs

Designing and Building SSL Remote Access VPNs (WebVPN)

Part IV: Appendixes

Designing and Building SSL Remote Access VPNs (WebVPN)

Appendix B. Answers to Review Questions

Comparing, Designing, and Deploying VPHs
Comparing, Designing, and Deploying VPNs
ISBN: 1587051796
EAN: 2147483647
Year: 2007
Pages: 124
Authors: Mark Lewis © 2008-2020.
If you may any questions please contact us: